Research Article
An Anonymous Authentication Protocol Based on Cloud for Telemedical Systems
Table 1
Comparisons of properties.
| | | Chen et al.’s [15] | Chiou et al.’s [16] | Cheng et al.’s [20] | Ours |
| | Resistance of impersonation attack | Yes | Yes | Yes | Yes | | Prevention of replay attack | Yes | Yes | Yes | Yes | | Preserving patient privacy | No | Yes | No | Yes | | Complete mutual authentication | No | No | No | Yes | | Perfect forward secrecy | Yes | Yes | Yes | Yes | | Confidentiality | Yes | Yes | No | Yes | | Perfect backward secrecy | Yes | Yes | Yes | Yes |
|
|